Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17-12-2024 08:46
Static task
static1
Behavioral task
behavioral1
Sample
65feb75027d9896a7edfae5c04887caafe0bf7ac619a7f29e88e4095346b45e6.exe
Resource
win7-20240729-en
General
-
Target
65feb75027d9896a7edfae5c04887caafe0bf7ac619a7f29e88e4095346b45e6.exe
-
Size
1.1MB
-
MD5
ad618f6ae6aff4af1e8045cc3cbac2c5
-
SHA1
01ab6f7d10493e65a465e0309a919edf65fc022b
-
SHA256
65feb75027d9896a7edfae5c04887caafe0bf7ac619a7f29e88e4095346b45e6
-
SHA512
6433fd1940f0ced43ca67cd345ce99a6a32b280cc9ecf6d7440f4ff74a09578c768b2bff49c4dc3cd83b5849faceb87711824560da7fa82285ae3c178c3d5a9a
-
SSDEEP
24576:9JBg0ln2Vp/6Qwu0KPDTAyk4fXRG94yq7C3TevSzFvWuTxzTut9eDu0tHAb50:m0l4RHhtbTAykURGzqYtFbTxXut
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/memory/2084-1-0x0000000000400000-0x000000000075D000-memory.dmp family_blackmoon -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65feb75027d9896a7edfae5c04887caafe0bf7ac619a7f29e88e4095346b45e6.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2084 65feb75027d9896a7edfae5c04887caafe0bf7ac619a7f29e88e4095346b45e6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\65feb75027d9896a7edfae5c04887caafe0bf7ac619a7f29e88e4095346b45e6.exe"C:\Users\Admin\AppData\Local\Temp\65feb75027d9896a7edfae5c04887caafe0bf7ac619a7f29e88e4095346b45e6.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2084